• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

William Bailey

Ethical Hacking

MIS 5211.701 ■ Fall 2020 ■ William Bailey
  • Home
  • INSTRUCTOR
  • SYLLABUS
  • Gradebook

William Bailey

Week 14 – Wrapping Up (Optional)

December 7, 2020 by William Bailey 7 Comments

As our semester wraps up, what was the idea/concept/topic that had the greatest impact, and why?

 

Filed Under: Week 14: Review of all topics Tagged With:

Week 12 & 13 – Wireless

December 1, 2020 by William Bailey 30 Comments

For this week’s discussion, research an article describing a breach where wireless (Wifi) was the entry point for the breach.

What weaknesses in the configuration did the attackers use to enter their target’s system?

What countermeasures would you implement if you wanted to defend against this breach?

Please include the URL for the article, so that others can read the article(s).

Filed Under: Week 12: Wireless Tagged With:

Week 11: Share Your Experiences – Security Shepherd

November 10, 2020 by William Bailey 22 Comments

During Week 11, what are your experiences with Security Shepherd?

Which deployment method (VMware / VirtualBox / Docker) did you choose, and why?

How many challenges did you complete?

When you encountered issues, what kind of steps did you take to resolve the issues and forge onward?

Filed Under: Uncategorized Tagged With:

Week 09: In the News: Web Application Breach

October 26, 2020 by William Bailey 44 Comments

To help us understand what can be obtained via a web application that has vulnerabilities, or weaknesses, that an untrusted outsider can take advantage of.  Krebsonsecurity talks about a breach caused to a web application that they had purchased from Fiserv, resulting in customers being able to to view account data for other customers, including account number, balance, phone numbers and email addresses.  (https://krebsonsecurity.com/tag/fiserv/)

For this week, research a recent breach announcement that was attributed to a web application failure.  How did attackers misuse the website, and what were they able to obtain?  How could the breach have been averted?

 

Filed Under: Week 09: Web Application Security Tagged With:

Week 08: Malware During CyberSecurity Awareness Month

October 20, 2020 by William Bailey 40 Comments

Let’s continue to discuss malware during CyberSecurity Awareness Month, and we’ll refer to the video series we looked at previously at https://staysafeonline.org/resource/security-awareness-episodes/ , specifically the following Episode 5: Removable Media, if you’ve not watched it already.

Research, and describe, a news articles describing a publicly-disclosed breach that can be tied to the use of removable media as the entry.

Also, for “bonus points”, what other security errors do you see in this episode? (https://staysafeonline.org/blog/security-best-practices-for-removable-media-and-devices/)

 

Filed Under: Week 08: Malware Tagged With:

Week 7: More on Vishing

October 15, 2020 by William Bailey 12 Comments

During class, we talked about Vishing.  Below is a link to a short video that shows an IT professional being duped after receiving compliments, a promise of an award, in exchange for his contact details and credit card information to pay for shipping the “reward”.

After watching your video at https://youtu.be/D_yAYhjNE-0 , What social engineering tactics did you observe in the video?

 

 

Filed Under: Week 07: Social Engineering Tagged With:

Week 05: Open Source – In the News

September 26, 2020 by William Bailey 34 Comments

For this discussion question, research a current article related to open-source components:

  • An article describing an organization or development team’s success (or failure) due to using ‘Open Source’ components.
  • A breach or compromise that was attributed to the use of open-source components.  For this option, please note if there were any mitigating factors that the organization should have considered.
  • Other considerations concerning the use of open-source components and/or operating systems.

Remember to include the URL of the article being referenced.

Filed Under: Week 05: System and User Enumeration Tagged With:

Week 05 – Open Source vs Commercial

September 26, 2020 by William Bailey 9 Comments

During this week, we talked about some additional scanning products used in Ethical Hacking.  While many are open source,  we also mentioned that there are some products that are commercial, and require a paid license.

During your trial of Kali, so far, have you found any interesting tools that you want to spend more time with?

While not disclosing your employer’s name, are you aware of tools that your employer currently uses?

 

Filed Under: Week 05: System and User Enumeration Tagged With:

Week 04: Vulnerability Scanning – In the News

September 18, 2020 by William Bailey 37 Comments

For this discussion question, research a current article related to vulnerability scanning:

  • Vulnerability Scanning being added as a regulatory or compliance issue.
  • A recent breach where vulnerability scanning, part of a vulnerability management program, would have prevented or minimized the impact of.
  • Recent strategies, such as new vulnerability scanning techniques.

Remember to include the URL of the article being referenced.

Filed Under: Week 04: Vulnerability Scanning Tagged With:

Week 03: Virtualization Security Issues – In the News

September 11, 2020 by William Bailey 40 Comments

For this discussion question, research an current article related to virtualization, such as:

  • How virtualization weaknesses could be exploited during an attack.
  • Creative uses of a virtualization environment for testing purposes.

Remember to include the URL of the article being referenced.

Filed Under: Week 03: Virtualization Tagged With:

  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 01: Overview (5)
  • Week 02: TCP/IP and Network Architecture (3)
  • Week 03: Virtualization (2)
  • Week 04: Vulnerability Scanning (2)
  • Week 05: System and User Enumeration (2)
  • Week 06: Metasploit (1)
  • Week 07: Social Engineering (2)
  • Week 08: Malware (2)
  • Week 09: Web Application Security (1)
  • Week 12: Wireless (2)
  • Week 14: Review of all topics (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in